Tag Archives: hackers

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Rate this:

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

Watch hackers break into the US power grid

Read more: http://www.techinsider.io/

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , | Leave a comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

The world of ‘hackonomics’ -CNN

http://edition.cnn.com/video/api/embed.html#/video/business/2014/10/27/bizview-pkg-burke-ny-dark-web-hackonomics.cnn

Rate this:

Posted in Technology | Tagged , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Your business and home needs a firewall…why?

So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs?   You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading

Rate this:

Posted in Apple, Computer Security, Education, Health, Home Networking, Information Technology, Internet, Linux, Technology, Windows | Tagged , , , , , | Leave a comment

300,000-plus wireless routers have malicious changes

ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , | Leave a comment

800M exposed records make 2013 record year for data breaches

While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading

Rate this:

Posted in Apple, Business, Computers, Education, Hacking, Home Networking, Information Technology, Linux, Medical, network, Networking, Organizations, Technology, Windows | Tagged , , , | Leave a comment

Adobe Account leaked credentials checker

Check to see if your Adobe email was leaked during a recent breach.  Change passwords on any account including on Adobe.  Never use the same password for different websites. http://adobe.cynic.al/

Rate this:

Posted in Business, Computer Security, Computers, Education, Information Technology, Organizations, Technology | Tagged , , , , , | Leave a comment

Microsoft releases the Enhanced Mitigation Experience Toolkit Version 4.0

The Enhanced Mitigation Experience Toolkit which is also known as EMET is designed to assist IT Pros with securing their systems.  EMET helps to block hackers from accessing systems.   EMET helps to block common attacks and enables IT personnel … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , | Leave a comment

Experts hope for another failure in next Anonymous attack

“Anonymous’ failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites. Anonymous plans to launch distributed denial of service (DDoS) … Continue reading

Rate this:

Posted in Information Technology | Tagged , , , , , | Leave a comment

How long will it take to crack your password?

Mickey found a great site that gives the approximate time it will take to break your password.  The site, howsecureismypassword.net gives the  approximate time and a background color that indicates how secure your password is.  There are other things to … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Hacking, Home Networking, Information Technology, network, Networking, Technology, Windows | Tagged , , , , , , , | 1 Comment

Massive Credit Card ring bust

From Help Net Security 47 individuals were arrested on Wednesday by the officers of the Royal Canadian Mounted Police following an investigation of a highly organized and disciplined criminal ring that has managed to steal at least $7 million via … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

They need your help – Many users to lose internet in July

Please tweet, share or reblog this post.   With this problem coming up, get the word out.  See how to check your computer at the end of this article. In July thousands of computers will be without internet.  Over 300,000 … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, freeware, Hacking, Information Technology | Tagged , , , , , , , , , , , , , , , , | 1 Comment

All the latest on the unmasking of LulzSec leader

LulzSec mastermind “Sabu” was identified today as 28-year-old Hector Monsegur, who has been working with the FBI since being arrested last summer and pleaded guilty to computer hacking crimes. We’re digging into court documents and planning detailed coverage of the story…All the … Continue reading

Rate this:

Posted in Computer Security, Hacking, Technology | Tagged , , , | Leave a comment

Did someone steal from you? Hacked organizations

Every year we feature the Identity Theft Resource Center and their database on companies that were hacked during the past years.   Go over and visit their site.    Remember these are KNOWN breaches.   ID Theft Resource Center

Rate this:

Posted in Computers | Tagged , , , , , , | Leave a comment

‘Anonymous’ Back With A Vengeance: Downs DoJ, MPAA, RIAA, Universal Music Websites – Dark Reading

In apparent retaliation for the federal takedown of online storage and file transfer site Megaupload announced by the Department of Justice today, the Anonymous hacktivist collective went to work waging mass distributed denial-of-service (DDoS) attacks that knocked offline the websites … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Hackers Claim Breach Of Norton Antivirus Source Code; Experts Say Claims Are Exaggerated – Dark Reading

Symantec confirmed that a hacking group has gained access to some of the source code of its Norton Antivirus product, but also stated the code was old and not stolen directly from Symantec servers.   Hackers Claim Breach Of Norton Antivirus … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Is your printer safe? Millions of printers may be susceptible to being hacked

MSNBC’s Red Tape recently posted information about printers that have internet access could be remotely programmed (firmware) and information could be obtained from print jobs allowing that information to be forwarded to other computers.  Very interesting article. (November 2011) HP … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment